سبد خرید

نمایش یک نتیجه

An Overview of Mobile Ad Hoc Networks: Applications and Challenges

0 از 5
0امتیاز
تومان
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the  proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless...

Building Cisco Multilayer Switched Networks

0 از 5
0امتیاز
تومان

Building Cisco Multilayer Switched Networks

0 از 5
0امتیاز
تومان
Activity Procedure: Answer these questions based on the figures. Write your answers in the appropriate spaces. Q1) In the figure, label these elements: A) Enterprise Campus B) Enterprise Edge C) Service Provider  Edge  Q2) In the figure, label these elements:...

Exploring antecedents of social media usage in B2B: a systematic review

0 از 5
0امتیاز
تومان
Purpose – This paper aims to review the state-of-the-art literature on social media adoption in business- tobusiness (B2B) contexts to propose an inclusive and theoretical viewpoint to understand the antecedents of this phenomenon. Design/methodology/approach – This paper presents the results...

Exporting firm’s engagement with trade associations: Insights from Chile

0 از 5
0امتیاز
تومان
This study addresses the effects of the firm’s level of engagement with trade associations located at the  company’s export market on export performance. It analyzes firm-level data from a South American  emerging economy, Chile. Results show that a stronger engagement...

Implementing Secure Converged Wide Area Networks

0 از 5
0امتیاز
تومان

Implementing Secure Converged Wide Area Networks

0 از 5
0امتیاز
تومان
Implementing Secure Converged Wide Area Networks (ISCW) is an advanced course that introduces techniques and features enabling or enhancing WAN and remote access solutions. The course focuses on using one or more of the available WAN connection technologies for remote...

Implementing Secure Converged Wide Area Networks

0 از 5
0امتیاز
تومان

Implementing Secure Converged Wide Area Networks

0 از 5
0امتیاز
تومان
Cisco Self-Defending Network: This topic describes the Cisco Self-Defending Network strategy.  The Cisco Self-Defending Network strategy describes the Cisco vision for security systems, and helps customers more effectively manage and mitigate risks posed to their networked business systems and applications....

Introduction to multilevel social networks

0 از 5
0امتیاز
تومان

Introduction to multilevel social networks

0 از 5
0امتیاز
تومان
Social network research focuses on the study of social systems by conceptualizing their internal structure in terms of sets of complex dependencies among social agents in the form of dyadic social ties. Typically, models for social networks incorporate additional features...

Location-Based Self-Adaptive Routing Algorithm for Wireless Sensor Networks in Home Automation

0 از 5
0امتیاز
تومان
The use of wireless sensor networks in home automation (WSNHA) is attractive due to their characteristics of self-organization, high sensing fidelity, low cost, and potential for rapid deployment. Although the AODVjr routing algorithm in IEEE 802.15.4/ZigBee and other routing algorithms...

Multi-Gigabit Millimeter Wave Wireless Communications for 5G: From Fixed Access to Cellular Networks

0 از 5
0امتیاز
تومان
With the formidable growth of various booming wireless communication services that require ever increasing data throughputs, the conventional microwave band below 10 GHz, which is currently used by almost all  mobile communication systems, is going to reach its saturation point...
درحال بارگذاری ...